opswat-2022-state-of-malware-analysis
pdf
keyboard_arrow_up
School
Northern Kentucky University *
*We aren’t endorsed by this school
Course
484
Subject
Information Systems
Date
Oct 30, 2023
Type
Pages
14
Uploaded by fawb1
an OPSWAT Research Report
2022 REPORT
State of Malware Analysis
Investigating Suspicious and Malicious Files
to Protect Critical Infrastructure
Attitudes, Statistics, Trends, and Best Practices to Address
File-Based Cyber Threats
Contents
Key Findings
_______________________________________________________________
3
Introduction
________________________________________________________________
4
The Technology:
Malware Analysis Lacks Automation, Integration, and Accuracy
__________
5
The Human Element:
The Cybersecurity Skills Gap Hits Malware Analysis
_______________________
8
Additional Findings
_______________________________________________________
10
Conclusions, Recommendations, Methodology
___________________________
12
OPSWAT Advantage
_______________________________________________________
13
2
State of Malware Analysis Report 2022
Key Findings
Malware Analysis Tools Lack
Automation, Integration, and Accuracy
Organizations Are Challenged to Find,
Train, and Retain Malware Analysis Staff
of organizations with
malware analysis
capabilities
face
challenges with their
malware analysis
toolset
.
99% stated they would
benefit from additional
capabilities for malware
analysis.
of organizations with
malware analysis
capabilities
face
challenges finding
malware analysis
expertise
.
The top challenges are
that candidates do not
have the right skills
and need to be trained
(57%), or that there are
not enough candidates
(54%).
of organizations
believe their greatest
challenges are a
lack
of automation
and 56%
stated they struggle
with
tools that are not
integrated
.
Malware analysis can
be a time-consuming
manual process across
multiple disparate
tools and disconnected
workflows.
of these organizations
acknowledge
their
malware
analysis function is
understaffed
.
Unfortunately, it may
be getting worse; 89%
struggled with staffing
in their IT security
organization during the
past 12 months.
of organizations
evaluating malware
analysis tools identify
accuracy as the most
important factor
.
Only 23%, less than
one-quarter, are very
confident in their ability
to identify, investigate,
and resolve malware
threats.
of organizations
train their existing
employees to acquire
talent
for malware
analysis, but 50% say
it is difficult to find
training programs
.
93%
94%
58%
70%
52%
73%
3
State of Malware Analysis Report 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Introduction
As organizations grapple with Advanced Persistent Threats (APTs), targeted attacks, and highly-
motivated ransomware groups, malware analysis has become a critical business process to
help respond to emerging threats. Mature organizations have moved beyond “check the box”
compliance to adopt a security posture that not only “assumes breach” but also proactively
consumes threat intelligence to better understand their adversaries and hunts for threats to stay
ahead of attackers.
It is evident that malware analysis is maturing as a business process
since 48% of surveyed organizations reported that they have a
“dedicated” malware analysis function. Furthermore, the majority of
surveyed organizations (58%) reported intermediate capabilities for
malware analysis, such as sandbox tools for threat detection.
However, despite this growing sense of maturity, nearly every
organization (93%) is challenged by malware analysis. These
challenges are rooted in tedious manual processes – a lack of
automation, integration, and accuracy.
Furthermore, even more organizations (94%) are challenged by the
staffing requirements for malware analysis – finding, training and
retaining experienced malware analysis talent. Even worse, struggles
with burnout point toward a greater trend of employees leaving the
workforce – the cybersecurity skills gap has never seemed more
apparent.
Consequently, most organizations (66%) are turning to managed security
service providers (MSSPs) and vendors to help shoulder the burden (at
least partially). Even more so, 74% of organizations are training existing
employees to acquire malware analysis expertise.
If malware analysis is to continue maturing as a business function, then
organizations need to be aware of their current limitations. OPSWAT
conducted this research to help organizations understand the greatest
challenges facing malware analysis today so they can make better-
informed decisions and improve their own programs.
What is Malware Analysis?
“Malware analysis” defines the set
of activities supporting file-level
investigations of suspicious files
(potential spyware, ransomware, APTs,
remote Trojans, key-loggers, etc.)
to understand their behaviors and
purpose. This is sometimes called file
investigation or reverse engineering
and serves several elements of
the business including threat
management, risk and compliance,
incident response, threat hunting,
digital forensics, and so forth.
4
State of Malware Analysis Report 2022
The Technology:
Malware Analysis Lacks
Automation, Integration, and
Accuracy
Effective incident response, threat hunting, and other mature cybersecurity functions rely
on quality threat intelligence that delivers insight into how malware behaves and the tactics
adversaries implement. File-based malware analysis plays an important role in providing this
visibility; however, it is also one of the greatest challenges to overcome. There are too many
manual processes, too many tools, not enough integration, and ultimately poor data outcomes – it
is an inefficient process that can create a bottleneck – and when responding to an attack, time is of
the essence.
Fig 1: 93% face challenges with their malware analysis toolset; lack of automation / integration top list
Overwhelmingly, 93% of organizations with malware
analysis capabilities face challenges with their
malware analysis toolset. The majority of these
organizations cite the lack of automation (58%)
and tools that are not integrated (56%) as their top
challenges – these are challenges that reveal malware
analysis as a time-consuming manual process.
Furthermore, nearly half of these organizations (45%)
also noted that their team lacks expertise in using tools
– we will explore this human element later.
The lack of integration between malware analysis tools can become a sore spot for organizations
that use multiple tools – and most of them do. Nearly three-quarters (72%) of organizations with
malware analysis capabilities are using three or more different types of malware analysis tools:
86% are using anti-malware tools, 58% are using forensic tools, and 53% are using dynamic
analysis or sandbox tools.
of organizations with
malware analysis capabilities
lack automation, followed by
a lack of integration.
58%
5
State of Malware Analysis Report 2022
Fig 2: Malware analysis tools typically have a low level of integration
Overwhelmingly, 87% of these organizations are purchasing commercial tools from security
vendors; furthermore, more than one-third (38%) are using tools from the open source community,
and more than one-quarter (28%) are using custom, homegrown, or in-house tools. However, only
20% of the survey participants reported any significant integration among malware analysis tools. It
is clear that this lack of integration is a challenge, which adds additional complexity to these time-
consuming manual processes. More complexity stalls productivity and introduces the potential for
error.
Fig 3: Accuracy is the top factor when evaluating tools for malware analysis
When it comes to evaluating tools for malware analysis, integration with other tools is one of the
top three factors, but accuracy and performance are the most important. In fact, accuracy is the
only factor that a majority of survey participants (52%) believed was the most important. One
interpretation could be that accuracy is the most important because these organizations know
how much they already struggle with poor data and a general lack of actionable intelligence. False
positives are another issue that demands better accuracy, as critical time could be wasted clearing
erroneous alerts instead of focusing on real threats.
6
State of Malware Analysis Report 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Fig 4: Only 21% report that they resolve more than 90% of malicious files
Only 3% of organizations are able to fully investigate and resolve malicious files through malware
analysis. Less than one-quarter (23%) are very confident in their ability to identify, investigate,
and resolve malware threats. In fact, 80% of these organizations resolve less than 90% of their
malicious files – and one in five (22%) resolves less than half!
The sheer volume of cybersecurity alerts, compounded by the vast majority being false positives
requiring further disposition, simply overwhelms the capacity of existing staff. And this gap
perpetuates day after day increasing the risk of a breach. It seems clear that malware analysis
could be improved with better accuracy and performance, perhaps leveraging automation across
multiple tools, thereby improving analyst productivity and the organizations’ ability to keep up.
One interesting observation is that executives and managers were more than twice as likely as their
front line staff to think they resolve 90% or more of their suspicious files – perhaps because upper
management is more removed from these time-consuming and error-prone manual processes.
Ultimately, neither group (only 23%) was very confident in their abilities to resolve 90% or more of
their suspicious files. There is a lot of room for improvement.
Fig 5: 99% would benefit from additional capabilities for malware analysis
When organizations face so many challenges with malware analysis, it is easy to understand why
they need additional capabilities. Remarkably, the majority of these organizations would benefit
from automated analysis orchestration (62%), accurate results (61%), fast analysis (59%), scanning
with multiple AV engines (53%), and out-of-the-box integrations (51%). Of course, all of these
capabilities could help reduce manual actions and improve response times, which brings us to our
next point: the human element.
7
State of Malware Analysis Report 2022
The Human Element:
The Cybersecurity Skills Gap
Hits Malware Analysis
The cybersecurity skills gap has been an issue for more than a
decade (Evans and Reeder published A Human Capital Crisis in
Cybersecurity in 2010). This skills gap is even more pervasive
with malware analysis. According to these survey participants,
66% believe their incident response function is understaffed
and even more (70%) believe that their malware analysis
function is understaffed.
More than half of these organizations (53%) hire new employees
to acquire talent for malware analysis, but even more (73%)
train their existing talent; however, both of these approaches
have their own challenges.
Fig 6: 94% report specific challenges finding malware analysis expertise
Overwhelmingly, 94% of organizations with malware analysis capabilities face challenges in finding
experienced malware analysts. The majority of these organizations believe that candidates do not
have the right skills and need to be trained (57%), or that there simply are not enough candidates
(54%). Furthermore, half of these organizations believe that it is difficult to find training programs
for existing staff (50%). This challenge seems to be double-edged, i.e. there is a lack of talent in the
job market and it is difficult to train existing talent.
of organizations
believe that their
malware analysis
function is
understaffed.
70%
8
State of Malware Analysis Report 2022
Fig 7: 89% report their IT security team has faced staffing challenges
This skills gap is even more pronounced in the midst of the great resignation. According to the
U.S. Department of Labor Statistics, 4.5 million workers quit (across all industries) in November
2021, including 2% of information industry workers. Among organizations with malware analysis
capabilities, 89% struggled with staffing in their IT security organization during the past 12 months.
The majority of these organizations have experienced staff burnout (56%), or their security staff
are being aggressively recruited to other companies (53%) - and with well over one-third of these
organizations (38%) concerned with increasing cybersecurity salaries or a lack of career growth
plans, staff have chosen to leave. Extrapolating these findings, it seems just as likely that staff
burnout could be caused by tedious processes and a sense of constantly being backlogged, or that
they left to work for a company with better tools and mature processes.
Furthermore, there is a management disconnect that suggests potential inertia from leadership in
improving front-line support. There was an interesting trend across several questions that revealed
an inflated perception from senior management regarding the ability to investigate and resolve
alerts related to suspicious or malicious files.
Fig 8: Two-thirds (66%) rely on external help for malware analysis
With so many challenges finding, training, and retaining malware analysis experts, it should come
as no surprise that two-thirds (66%) of these organizations outsource some of their malware
analysis activities to a managed security service provider (MSSP) or third-party vendor. Ultimately,
it seems like organizations would prefer to train their own employees to perform malware analysis,
they have just been challenged to find an effective training program.
9
State of Malware Analysis Report 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Additional Findings
Beyond the technical limitations of malware analysis tools and the staffing challenges of malware
analysis experts, there were a few additional survey questions that yielded interesting results that
didn’t quite fit elsewhere.
Organizational Responsibility
Fig 9: Malware analysis is typically owned by threat management or risk management/compliance
The responsibility for malware analysis shows a surprisingly broad range of functional owners, with
threat management (33%) representing the largest organizational group. Two-thirds (64%) reported
that malware analysis ownership resides in the general IT security or InfoSec organization which
typically manages the security controls.
Attack Vectors
Fig 10: Email is the most concerning potential entry-point for malware reported
10
State of Malware Analysis Report 2022
It may not be a surprise that email (65%) and web (47%) are the top two attack vectors that concern
these organizations; after all, these are the most obvious choices. However, what is interesting is
that a quarter (25%) of survey participants eschewed these more obvious choices in favor of third-
party software – it seems that third-party software risk, perhaps made more visible from recent
SolarWinds and Log4J events, is becoming an elevated concern within the industry.
Cloud
Fig 11: 9 in 10 (89%) have concerns about using online tools for malware analysis
Beyond the threats of email, web, and third-party software is another third-party risk: cloud-based
malware analysis platforms. Overwhelmingly, 89% of survey participants shared some concerns
that submitting malware samples to online analysis and virus scanning tools might inadvertently
expose security vulnerabilities or sensitive data. Once again, it is interesting to note that executives
are less concerned with this risk than team managers or individual contributors, who often are
hyper-sensitive to security risks and run a bit contradictory to the broader acceptance of cloud
migration trends for business applications.
Fig 12: Only a third (34%) store malware samples in the public cloud
This concern with third-party risk can also be seen in how organizations store their malware
samples. Only one-third (34%) of these organizations store their malware samples on the public
cloud, while more than two-thirds (69%) of these organizations store their malware samples on-
premises.
11
State of Malware Analysis Report 2022
Conclusions,
Recommendations,
Methodology
The technical limitations of malware analysis and the struggle
to find experienced malware analysts are two sides of the
same coin. The demand for more automated, integrated, and
accurate solutions becomes even more pronounced when
organizations are understaffed, and their employees lack the
training they need to work effectively.
Malware analysis is a time-consuming manual process, made
all the more complex by tools that are not integrated. Such
monotonous workflows can become the source of employee
burnout, or introduce human error into the process – the
demand for high-performance and accurate solutions is at a
premium. Security can be enhanced through less complexity.
Recommendations
Business leaders should realize that investing in more automated, integrated, and accurate
solutions is a win-win situation because it enables their employees to work more efficiently, more
effectively, and less tediously – resulting in happier staff. That spells higher performance and lower
costs in the long run, and a more secure posture going forward.
Finally, the decade-long cybersecurity skills gap has never seemed more apparent – organizations
need to realize that there is a shortage of experienced malware analysis talent. Partnering with
MSSPs and training programs can help bridge this skills gap. Streamlined solutions can help lower
this technical barrier to malware analysis with enhanced automation, integration, and accurate
results.
Methodology
Dimensional Research, an independent research firm specializing in enterprise technology, invited
independent sources of IT security professionals to participate in an online survey. A variety of
questions were asked on topics related to general security and malware analysis. Responses were
captured between December 8 and December 21, 2021.
A total of 309 qualified participants completed the survey, comprising 17+ industries where 54%
included Industrial Control Systems (ICS) as well as IT within their critical infrastructure. All had
decision-making responsibility for security of online applications at a company that had at least
500 employees and a malware analysis security function. Participants whose company did not have
malware analysis capabilities were filtered out of the survey. That was a small minority (3.7%).
The fact that
20% of surveyed
organizations resolve less than
50%
of their malware analysis
queue is indicative of how these
challenges can spiral out of
control for so many.
12
State of Malware Analysis Report 2022
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
OPSWAT MetaDefender Malware Analyzer and OPSWAT Sandbox bring a new level of “smart” to the
process of malware analysis. From introducing faster and more accurate analysis technologies, to
repositioning malware analysis as a business-enabling process versus one of drudgery, IT service
teams benefit from more actionable intelligence, timely responses, service uptime, and risk-adaptive
operations. OPSWAT provides a complete integration, orchestration, automation and reporting
framework to support your malware analysis needs. By leveraging all your existing best-of-breed
tools, removing repetitive manual activities through automation, and unifying outcomes from multiple
analyses, your business will benefit from more accurate and timely analysis outcomes.
Contact OPSWAT
OPSWAT Advantage
MetaDefender Malware Analyzer
MetaDefender Kiosk
Local Threat Intelligence – Out
Automated Workflow
Analysis Tools
13
State of Malware Analysis Report 2022
© 2022 OPSWAT, Inc. All rights reserved. OPSWAT
®
,
MetaDefender
®
, MetaAccess
™
, Trust No File
™
and the
OPSWAT logo are trademarks of OPSWAT, Inc.
Related Documents
Browse Popular Homework Q&A
Q: Force (g)
150
100
50
1
1.5
2
2.5
3
Time (sec)
3.5
st
4.5
5
5.5
Q: True or false? Antibodies protect you primarily against foreign cells in your body fluids while…
Q: An initial census taken in a small Asian country found the population to be 22.9 million. Ten years…
Q: Draw the major product of this elimination. Consider
regiochemistry and stereochemistry. Ignore…
Q: The gas mileage for a certain vehicle can be approximated by m = −0.04x^2+ 3.6x − 49, where x is the…
Q: 4 lines of evidence for evolution are presented (population, gene pool, allele…
Q: 16) Which of the following aqueous solutions has the highest pH value?
0.1M of Ammonium hydroxide…
Q: +
Click to draw a new structure
Draw the Lewis structure of SISO and then determine if the molecule…
Q: 2. The table below shows the solubility data (in g of solute per 100 mL solvent) for compound X in…
Q: Consider the reaction of 0.161 g of aluminum metal with 50.0 mL of 0.235 M Co(NO₃)₂.
a. Which metal,…
Q: happy ne
Q: or what reason might a company purchase treasury stock?
To increase shareholder liquidity
To…
Q: Determine the quiescent levels of Ico and VCEQ for the network of Figure Q3.
V₁0
H
10 μF
250 ΚΩ
10 V…
Q: +
O
Q: If x and y are integers such that x³ (y + 5) is odd, then x is odd and y is even.
Q: Run nslookup to obtain the IP address of a Web server in Asia. What is the IP address of that…
Q: A party balloon filled with helium deflates to 2323 of its original volume in 8.0 hours. How long…
Q: e. Are "Republican" and "Democrat" complementary events in this data set? Give a reason for your…
Q: Problem 1: The steel rod has Young's modulus of 200GPa. Its cross-sectional area is uniform and A=60…
Q: I'm trying to edit column DEGREE_TYPE_MAJOR to DEGREE_TYPE and add a column MAJOR in Snowflake. How…
Q: 17) The moment of Inertia of a solid uniform sphere of mass m and radius R is
given by the equation…
Q: What is the HCF of 1500 and 216
Q: A presidential candidate plans to begin her campaign by visiting the capitals in4 of 49 states. What…
Q: Find the expected value of the random variable.
X
P(x)
2
0.2
3
0.3
What is the expected value?
4
5…
Q: Refer to the appropriate triangle or trigonometric identity to compute the given value. cos(cot-1 1)